Items where Author is "Issac, Biju"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 88.

Article

Yumlembam, Rahul, Issac, Biju, Jacob, Seibu Mary and Yang, Longzhi (2023) IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense. IEEE Internet of Things Journal, 10 (10). pp. 8432-8444. ISSN 2327-4662

Rafiq, Husnain, Aslam, Nauman, Aleem, Muhammad, Issac, Biju and Randhawa, Rizwan Hamid (2022) AndroMalPack: Enhancing the ML-based Malware Classification by Detection and Removal of Repacked Apps for Android Systems. Scientific Reports, 12 (1). p. 19534. ISSN 2045-2322

Gibson, Simran, Issac, Biju, Zhang, Li and Jacob, Seibu Mary (2020) Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms. IEEE Access, 8. pp. 187914-187932. ISSN 2169-3536

Imam, Niddal, Issac, Biju and Jacob, Seibu Mary (2019) A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift. International Journal of Computational Intelligence and Applications, 18 (02). p. 1950010. ISSN 1469-0268

Sharma, Rupam, Issac, Biju and Kalita, Hemanta (2019) Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants. IEEE Access, 7. pp. 52427-52439. ISSN 2169-3536

Sharma, Rupam Kumar, Kalita, Hemanta and Issac, Biju (2018) Are machine learning based intrusion detection system always secure? An insight into tampered learning. Journal of Intelligent and Fuzzy Systems, 35 (3). pp. 3635-3651. ISSN 1064-1246

Shah, Syed Ali Raza, Issac, Biju and Jacob, Seibu Mary (2018) Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning. International Journal of Computational Intelligence and Applications, 17 (02). p. 1850007. ISSN 1469-0268

Shah, Syed Ali Raza and Issac, Biju (2018) Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Generation Computer Systems, 80. pp. 157-170. ISSN 0167-739X

Issac, Biju, Barlaskar, Esha and Singh, Yumnam Jayanta (2018) Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres. International Journal of Grid and Utility Computing, 9 (1). ISSN 1741-847X

Choudhury, Bismita, Then, Patrick, Issac, Biju, Raman, Valliappan and Haldar, Manas Kumar (2018) A Survey on Biometrics and Cancelable Biometrics Systems. International Journal of Image and Graphics, 18 (01). p. 1850006. ISSN 0219-4678

Mathew, K., Issac, Biju and Tan, C. E. (2017) Evaluation of signal attenuation for bluetooth, zigbee and sound in foliage. Journal of Telecommunication, Electronic and Computer Engineering, 9 (2-9). pp. 43-48. ISSN 2180-1843

Rura, Lauretha, Issac, Biju and Haldar, Manas Kumar (2017) Online Voting System based on Image Steganography and Visual Cryptography. Journal of Computing and Information Technology, 25 (1). pp. 47-61. ISSN 1330-1136

Richert, Viktor, Issac, Biju and Israr, Nauman (2017) Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments. Wireless Communications and Mobile Computing, 2017. ISSN 1530-8669

Barlaskar, Esha, Singh, Yumnam Jayanta and Issac, Biju (2016) Energy-efficient virtual machine placement using enhanced firefly algorithm. Multiagent and Grid Systems, 12 (3). pp. 167-198. ISSN 1574-1702

Rura, Lauretha, Issac, Biju and Haldar, Manas Kumar (2016) Implementation and Evaluation of Steganography Based Online Voting System. International Journal of Electronic Government Research, 12 (3). pp. 71-93. ISSN 1548-3886

Kumar Sharma, Rupam, Kalita, Hemanta and Issac, Biju (2016) Plant based Biologically Inspired Intrusion Response Mechanism: An insight into the proposed model PIRIDS. Journal of Information Assurance and Security, 11 (6). pp. 340-347. ISSN 1554-1010

Alzaid, Wael and Issac, Biju (2016) Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks. International Journal of Business Data Communications and Networking, 12 (1). pp. 36-62. ISSN 1548-0631

Albayati, Mohanad and Issac, Biju (2015) Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System. International Journal of Computational Intelligence Systems, 8 (5). pp. 841-853. ISSN 1875-6891

Song, Shuang and Issac, Biju (2014) Analysis of Wifi and Wimax and Wireless Network Coexistence. International journal of Computer Networks & Communications, 6 (6). pp. 63-77. ISSN 0975-2293

Albkerat, Ali and Issac, Biju (2014) Analysis of IPV6 Transition Technologies. International journal of Computer Networks & Communications, 6 (5). pp. 19-38. ISSN 0975-2293

Shahi, Amir, Issac, Biju and Modapothala, Jashua (2014) Automatic analysis of corporate sustainability reports and intelligent scoring. International Journal of Computational Intelligence and Applications, 13 (01). p. 1450006. ISSN 1469-0268

Issac, Biju, Hamid, Khairuddin and Tan, C. E. (2010) Hybrid mobility prediction of 802.11 infrastructure nodes by location tracking and data mining. Journal of Information Technology in Asia, 3 (1). ISSN 1623-5042

Issac, Biju (2009) Secure ARP and secure DHCP Protocols to mitigate security attacks. International Journal of Network Security, 8 (2). pp. 107-118. ISSN 1816-353X

Modapothala, Jashua Rajesh and Issac, Biju (2009) Analysis of corporate environmental reports using statistical techniques and data mining. Communications of the IBIMA, 10. pp. 32-38. ISSN 1943-7765

Issac, Biju, Hamid, Khairuddin and Tan, Chong Eng (2008) Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks. IAENG International Journal of Computer Science, 35 (3). ISSN 1819-656X

Issac, Biju and Mohammed, Lawan A. (2007) War Driving and WLAN Security Issues—Attacks, Security Design and Remedies. Information Systems Management, 24 (4). pp. 289-298. ISSN 1058-0530

Jacob, Seibu Mary and Issac, Biju (2007) Mobile Learning Culture and Effects in Higher Education. IEEE Multidisciplinary Engineering Education Magazine, 2 (2). pp. 19-21. ISSN 1558-7908

Mohammed, Lawan A. and Issac, Biju (2007) Detailed DoS attacks in wireless networks and countermeasures. International Journal of Ad Hoc and Ubiquitous Computing, 2 (3). pp. 157-166. ISSN 1743-8225

Book Section

Neera, Jeyamohan, Chen, Xiaomin, Aslam, Nauman, Issac, Biju and O'Brien, Eve (2022) A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. In: Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022). Scitepress, Setúbal, Portugal, pp. 325-332. ISBN 9789897585906

Rafiq, Husnain, Aslam, Nauman, Issac, Biju and Randhawa, Rizwan Hamid (2022) An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, Piscataway, US, pp. 1-6. ISBN 9781665409278, 9781665409261

Pye, Jack, Issac, Biju, Aslam, Nauman and Rafiq, Husnain (2020) Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2020. IEEE, Piscataway, pp. 1777-1882. ISBN 9781665403924

Ketsbaia, Lida, Issac, Biju and Chen, Xiaomin (2020) Detection of Hate Tweets using Machine Learning and Deep Learning. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom): 29 December 2020 – 1 January 2021 Guangzhou, China. IEEE, Piscataway, NJ, pp. 751-758. ISBN 9781665403931, 9781665403924

Stobbs, Jordan, Issac, Biju and Seibu, Mary Jacob (2020) Phishing Web Page Detection using Optimised Machine Learning. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom): 29 December 2020 – 1 January 2021 Guangzhou, China. IEEE, Piscataway, NJ, pp. 483-490. ISBN 9781665403931, 9781665403924

Mistry, Kamlesh, Issac, Biju, Jacob, Seibu Mary, Jasekar, Jyoti and Zhang, Li (2018) Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, pp. 424-429. ISBN 978-1-5386-9583-8

Sharma, Rupam Kumar, Kalita, Hemanta Kr and Issac, Biju (2016) PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants. In: Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, 424 . Springer, pp. 105-116. ISBN 9783319280301

Mathew, Kuruvilla, Tan, Chong Eng and Issac, Biju (2015) Evaluation of Sound Perception to Identify Candidate Frequency for Wireless Networking. In: New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, 312 . Springer, pp. 349-359. ISBN 978-3-319-06763-6

Shahi, Amir Mohammad, Issac, Biju and Modapothala, Jashua Rajesh (2015) Reliability Assessment of an Intelligent Approach to Corporate Sustainability Report Analysis. In: Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Springer, pp. 233-240. ISBN 978-3-319-06772-8

Mathew, Kuruvilla and Issac, Biju (2015) Ubiquitous Text Transfer Using Sound a Zero-Infrastructure Alternative for Simple Text Communication. In: Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Lecture Notes in Electrical Engineering, 313 . Springer, pp. 241-246. ISBN 978-3-319-06772-8

Rura, Lauretha, Issac, Biju and Haldar, Manas (2015) Vulnerability Studies of E2E Voting Systems. In: Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Lecture Notes in Electrical Engineering, 313 . Springer, pp. 223-231. ISBN 978-3-319-06772-8

Mathew, Kuruvilla, Issac, Biju and Eng, Tan Chong (2014) A communication architecture using low frequency signals. In: 2014 International Conference on Data Science & Engineering (ICDSE). IEEE, pp. 188-193. ISBN 978-1-4799-6870-1

Sharma, Rupam Kumar, Kalita, Hemanta Kumar and Issac, Biju (2014) Different firewall techniques: A survey. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, pp. 1-6. ISBN 978-1-4799-2696-1

Issac, Biju and Israr, Nauman (2014) Survey of intelligent computing. In: Case Studies in Intelligent Computing. CRC Press, New York, pp. 1-16. ISBN 9781482207033

Issac, Biju and Israr, Nauman (2014) Survey of secure computing. In: Case Studies in Secure Computing. CRC Press, New York, pp. 1-26. ISBN 9781482207064

Rura, Lauretha, Issac, Biju and Haldar, Manas (2012) Analysis of image steganography techniques in secure online voting. In: Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, pp. 120-124. ISBN 978-1-4577-1586-0

Shahi, Amir Mohammad, Issac, Biju and Modapothala, Jashua (2012) Analysis of supervised text classification algorithms on corporate sustainability reports. In: Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, pp. 96-100. ISBN 978-1-4577-1586-0

Mathew, Kuruvilla and Issac, Biju (2012) Intelligent spam classification for mobile text message. In: Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, pp. 101-105. ISBN 978-1-4577-1586-0

Rura, Lauretha, Issac, Biju and Haldar, Manas Kumar (2012) Online voting verification with cryptography and steganography approaches. In: Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, pp. 125-129. ISBN 978-1-4577-1586-0

Rura, Lauretha, Issac, Biju and Haldar, Manas Kumar (2011) Secure electronic voting system based on image steganography. In: 2011 IEEE Conference on Open Systems. IEEE, pp. 80-85. ISBN 978-1-61284-931-7

Jayaraj, Maria, Issac, Biju and Haldar, Manas (2011) Analysis of handoff mechanisms in mobile IP. In: Proceedings of the Fourth Global Conference on Power Control and Optimization. AIP, pp. 160-165. ISBN 9780735408937

Issac, Biju (2010) First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices. In: Innovations and Advances in Computer Sciences and Engineering. Springer, pp. 319-324. ISBN 9789048136575

Issac, Biju (2010) Spam Detection Approaches with Case Study Implementation on Spam Corpora. In: Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues. IGI Global, pp. 194-212. ISBN 9781609600150

Issac, Biju and Jacob, Seibu Mary (2010) Effects of Online MCQ Tests on Student Learning. In: Technological Developments in Education and Automation. Springer, pp. 403-408. ISBN 9789048136551

Issac, Biju (2010) Study of UMTS Handover Scenarios. In: Technological Developments in Networking, Education and Automation. Springer, pp. 561-566. ISBN 978-90-481-9150-5

Issac, Biju, Jap, Wendy and Sutanto, Jofry (2009) Improved Bayesian Anti-Spam Filter Implementation and Analysis on Independent Spam Corpuses. In: 2009 International Conference on Computer Engineering and Technology. IEEE, pp. 326-330. ISBN 978-0-7695-3521-0

Issac, Biju and Tan, Chong Eng (2008) Wireless Technologies for Mobile Computing. In: Ubiquitous Computing. IGI Global, pp. 114-129. ISBN 9781599046938

Issac, Biju, Mering, Jasmine, Chiong, Raymond, Jacob, Seibu and Then, Patrick (2007) E-Learning Implementation and Its Diverse Effect. In: Information Technology and Economic Development. IGI Global, pp. 260-277. ISBN 9781599045795

Issac, Biju, Chiong, Raymond and Jacob, Seibu (2006) Analysis of Phishing Attacks and Countermeasures. In: Managing Information in the Digital Economy: Issues and Solutions - Proceedings of the 6th International Business Information Management Association Conference, IBIMA 2006. International Business Information Management Association, IBIMA, pp. 339-346. ISBN 9780975339350

Issac, Biju, Hamid, Khairuddhin and Tan, C. E. (2006) Analysis of single and mixed 802.11 networks and mobility architecture. In: 2006 International Conference on Computing & Informatics. IEEE, pp. 1-6. ISBN 978-1-4244-0219-9

Report

Fernandes, Kiran, Goumagias, Nikolaos, Shukla, Manish, Oxley, Greg, Purvis, Keiran, Cabras, Ignazio, Xiong, Yu, Seddighi, Hamid, Watson, Derek, Coleman, Peter, Matthew, Sony, Issac, Biju and Jacob, Seibu Mary (2018) Developing an innovation ecosystem: Policy, skills and operations. Project Report. North East Local Enterprise Partnership.

Conference or Workshop Item

Ketsbaia, Lida, Issac, Biju and Chen, Xiaomin (2021) Evaluation of Cyberbullying using Optimized Multi-Stage ML Framework and NLP. In: Defence and Security Doctoral Symposium 2021, 9 Nov 2021, Online, Cranfield.

Suleiman, Mohammed and Issac, Biju (2018) Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. In: 28th International Conference on Computer Theory and Applications (ICCTA 2018), 30 October - 1 November 2018, Alexandria.

Mistry, Kamlesh, Jasekar, Joyti, Issac, Biju and Zhang, Li (2018) Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour. In: IEEE World Congress on Computational Intelligence, 8-13 July 2018, Rio de Janeiro.

Choudhury, Bismita, Then, Patrick, Raman, Valliappan, Issac, Biju and Haldar, Manas Kumar (2017) Cancelable iris Biometrics based on data hiding schemes. In: SCOReD 2016 - 14th IEEE Student Conference on Research and Development, 13th - 14th December 2016, Kuala Lumpur, Malaysia.

Mathew, Kuruvilla, Issac, Biju and Eng, Tan Chong (2016) Evaluation of antenna performance for use in wide band wireless protocols. In: APCC 2016 - 22nd Asia-Pacific Conference on Communications, 25th - 27th August 2016, Yogyakarta, Indonesia.

Mathew, Kuruvilla, Issac, Biju and Eng, Tan Chong (2015) Performance analysis of RTS/CTS protocol over Basic Access in wireless networks. In: CITA 2015 - 9th International Conference on IT in Asia, 4th - 5th August 2015, Kota Samarahan, Malaysia.

Mathew, Kuruvilla, Issac, Biju and Eng, Tan Chong (2014) Wireless network architecture using sound for ubiquitous signal transmission. In: ICCCNT 2014 - 5th International Conference on Computing Communication and Networking Technologies, 11th - 13th July 2014, Hefei, China.

Mathew, Kuruvilla, Issac, Biju and Eng, Tan Chong (2013) Ambient noise analysis on sound for use in wireless digital transmission. In: CITA 2013 - 8th International Conference on Information Technology in Asia, 1st - 4th July 2013, Kota Samarahan, Malaysia.

Shahi, Amir Mohammad, Issac, Biju and Modapothala, Jashua Rajesh (2013) Intelligent Corporate Sustainability report scoring solution using machine learning approach to text categorization. In: STUDENT 2012 - 3rd IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, 6th - 9th October 2012, Kuala Lumpur, Malaysia.

Shahi, Amir Mohammad, Issac, Biju and Modapothala, Jashua Rajesh (2012) Enhanced intelligent text categorization using concise keyword analysis. In: ICIMTR 2012 - 2012 International Conference on Innovation, Management and Technology Research, 21st - 22nd May 2012, Malacca, Malaysia.

Modapothala, J. R., Issac, Biju and Jayamani, E. (2010) Appraising the Corporate Sustainability Reports – Text Mining and Multi-Discriminatory Analysis. In: CISSE 2009 - Fifth International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, 4th - 12th December 2009, Bridgeport, CT, USA.

Issac, Biju and Jap, Wendy J. (2010) Implementing spam detection using Bayesian and Porter Stemmer keyword stripping approaches. In: TENCON 2009 - 2009 IEEE Region 10 Conference, 23rd - 26th November 2009, Singapore.

Then, Husin J., Issac, Biju, Chung, Lau T., Wongso, Susanti, Bong, Riyan, Lu, Lesley and Ling, Yu P. (2009) Analysis, Design and Implementation of a Web-Based Payroll Application Software. In: ICCTD 2009 - 2009 International Conference on Computer Technology and Development, 13th - 15th November 2009, Kota Kinabalu, Malaysia.

Modapothala, Jashua R. and Issac, Biju (2009) Study of economic, environmental and social factors in sustainability reports using text mining and Bayesian analysis. In: ISIEA 2009 - 2009 IEEE Symposium on Industrial Electronics and Applications, 4th - 6th October 2009, Kuala Lumpur, Malaysia.

Issac, Biju (2009) Study of mixed mode scenarios with IEEE 802.11 networks and Bluetooth network. In: ISIEA 2009 - 2009 IEEE Symposium on Industrial Electronics and Applications, 4th - 6th October 2009, Kuala Lumpur, Malaysia.

Issac, Biju, Hamid, K. A. and Tan, Chong Eng (2009) Predictive Mobility Management with Delay Optimizations in 802.11 Infrastructure Networks. In: IMECS 2008 - International MultiConference of Engineers and Computer Scientists 2008, 19th - 21st March 2008, Kowloon, Hong Kong.

Modapothala, Jashua Rajesh and Issac, Biju (2009) Assessing Corporate Environmental and Sustainability Reports Using Text Mining and Bayesian Estimate. In: ICTSE 2009 - 2009 International Conference on Software Technology and Engineering, 24th - 26th July 2009, Chennai, India.

Modapothala, Jashua Rajesh and Issac, Biju (2009) Analysis of corporate environmental reports using statistical techniques and data mining. In: IBIMA 2009 - 11th International Business Information Management Association Conference, 4th - 6th January 2009, Cairo, Egypt.

Issac, Biju (2009) Performance Evaluation of 802.11 Mobility and Interference Issues. In: ICCEA 2009 - 2009 International Conference on Computer Engineering and Applications, 6th - 8th June 2009, Manila, Philippines.

Modapothala, Jashua Rajesh and Issac, Biju (2009) Evaluation of Corporate Environmental Reports Using Data Mining Approach. In: ICCET 2009 - 2009 International Conference on Computer Engineering and Technology, 22nd - 24th January 2009, Singapore.

Issac, Biju (2009) Study of 802.11 Network Performance and Wireless Multicasting. In: ICCET 2009 - 2009 International Conference on Computer Engineering and Technology, 22nd - 24th January 2009, Singapore.

Jacob, Seibu Mary and Issac, Biju (2008) The mobile devices and its mobile learning usage analysis. In: IMECS 2008 - International MultiConference of Engineers and Computer Scientists 2008, 19th - 21st March 2008, Kowloon, Hong Kong.

Kamal, S. and Issac, Biju (2007) Analysis of Network Communication Attacks. In: SCORED 2007 - 5th Student Conference on Research and Development, 11th - 12th December 2007, Selangor, Malaysia.

Ghavidel, A. Z. and Issac, Biju (2007) Secure Transport Protocols for DDoS Attack Resistant Communication. In: SCORED 2007 - 5th Student Conference on Research and Development, 11th - 12th December 2007, Selangor, Malaysia.

Issac, Biju and Raman, Valliappan (2007) Spam Detection Proposal in Regular and Text-based Image Emails. In: TENCON 2006 - 2006 IEEE Region 10 Conference, 14th - 17th November 2006, Hong Kong, China.

Issac, Biju, Hamid, Khairuddhin and Tan, Chong Eng (2007) Pre-Authenticated and Adaptive IP Mobility for WLAN nodes. In: DFMA 2006 - 2nd International Conference on Distributed Frameworks for Multimedia Applications, 15th - 17th May 2006, Pulau Pinang, Malaysia.

Book

Issac, Biju and Israr, Nauman (2014) Case Studies in Intelligent Computing: Achievements and Trends. Taylor & Francis. ISBN 9781482207033

Issac, Biju and Israr, Nauman (2014) Case Studies in Secure Computing: Achievements and Trends. Taylor & Francis. ISBN 9781482207064

Issac, Biju (2009) IEEE 802.11 Wireless Networks – Basic Concepts, Mobility Management and Security Enhancements. VDM Verlag, Saarbrücken, Germany. ISBN 9783639186086

This list was generated on Thu Mar 28 15:08:46 2024 UTC.